Jump to content

Search the Community

Showing results for tags 'joomla'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Informatii generale
    • Anunturi importante
    • Bine ai venit
    • Proiecte RST
  • Sectiunea tehnica
    • Exploituri
    • Challenges (CTF)
    • Bug Bounty
    • Programare
    • Securitate web
    • Reverse engineering & exploit development
    • Mobile security
    • Sisteme de operare si discutii hardware
    • Electronica
    • Wireless Pentesting
    • Black SEO & monetizare
  • Tutoriale
    • Tutoriale in romana
    • Tutoriale in engleza
    • Tutoriale video
  • Programe
    • Programe hacking
    • Programe securitate
    • Programe utile
    • Free stuff
  • Discutii generale
    • RST Market
    • Off-topic
    • Discutii incepatori
    • Stiri securitate
    • Linkuri
    • Cosul de gunoi
  • Club Test's Topics
  • Clubul saraciei absolute's Topics
  • Chernobyl Hackers's Topics
  • Programming & Fun's Jokes / Funny pictures (programming related!)
  • Programming & Fun's Programming
  • Programming & Fun's Programming challenges
  • Bani pă net's Topics
  • Cumparaturi online's Topics
  • Web Development's Forum
  • 3D Print's Topics

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Yahoo


Jabber


Skype


Location


Interests


Biography


Location


Interests


Occupation

Found 9 results

  1. Joomla FocalPoint component version 1.2.3 suffers from a remote SQL injection vulnerability. # Exploit Title: Joomla Component FocalPoint 1.2.3 - SQL Injection # Date: 2017-03-23 # Home : https://extensions.joomla.org/extensions/extension/maps-a-weather/maps-a-locations/focalpoint/ # Exploit Author: Persian Hack Team # Discovered by : Mojtaba MobhaM (kazemimojtaba@live.com) # Home : http://persian-team.ir/ # Google Dork : inurl:index.php?option=com_focalpoint # Telegram Channel AND Demo: @PersianHackTeam # Tested on: WIN # POC : id Parameter Vulnerable to SQL Injection Put a Strin
  2. https://medium.com/@showthread/joomla-3-6-4-account-creation-elevated-privileges-write-up-and-exploit-965d8fb46fa2#.dkvmm22rn
  3. Salut! Vreau sa pun doua site-uri pe picioare si caut un tip serios care are habar ce face. 1. E vorba de un magazin online, in OpenCart (full Romana). 2. Un site de prezentare (am tema) in Joomla cu tema in panoul de admin (full Romana). Daca reusim sa ne intelegem ofer la schimb o camera Samsung nou nouta (la cutie). Pentru alte intrebari, va stau la dispozitie ! Multumesc. P.S...Pentru valorile "nerecunoscute", sunt satul de caterinca si oameni fffff. inteligenti care aduc 0 plusvaloare. Comentariile inutile inseamna mai putin decat 0 (ZERO). Inseamna pierdere de timp...
  4. Researchers have seen an uptick in Adobe Flash .SWF files being used to trigger malicious iFrames across websites. Several hundred WordPress and Joomla websites have been swept up in the campaign, first observed by researchers at the firm Sucuri last November. “Though it’s uncertain how many iterations existed in the wild when we first reported the issue, this time we’ve found a lot of websites where the infection looks similar,” Peter Gramantik, a senior malware researcher at the firm wrote Thursday. According to Gramantik the infection is clearly marked by a .SWF file with three random chara
  5. Researchers have uncovered a distributed denial-of-service (DDoS) attack campaign that takes advantage of Joomla servers with a vulnerable Google Maps plug-in installed. Akamai's Prolexic Security Engineering & Research Team (PLXsert) worked with PhishLabs' Research, Analysis, and Intelligence Division (R.A.I.D) to analyze malicious traffic coming from multiple Joomla websites, a threat advisory (PDF) issued Wednesday said. Through analysis, the teams found that attackers were able to use servers as DDoS zombies due to a vulnerability in a Google Maps plug-in that allows the plug-in to act
  6. template-uri beslpatnye ?i plugin-uri site-uri de prezentare Traksa.com Eu voi fi ad?ugarea de intr?ri în fiecare zi în acest thread. În cazul în care nu g?si?i un model de aici, du-te ?i verific? pe site-ul, exist? o mul?ime de ele. provided by site traksa.com. I will post some themes or plugins everyday in this thread.
  7. need dotnet framework 4.5 Link: Joomla Vulnerability Scanner Link: WPscan
  8. Tutorialul nu e realizat de mine este loat de aici :Instalare Joomla 1.5 - site Joomla bun.. Acest tutorial se refera la instalarea Joomla! 1.5.x, local, pe un server XAMPP.(adica tre sa aveti instalat xampp in pc il puteti loua de aici apache friends - xampp si joomla o luati de aici + e in romana link: Joomla! Romania Dupa cum stim primul pas este sa descarcam de pe joomla.org, ultima versiune de Joomla, la ora aceasta versiunea e 1.5.9, adica am descarcat pachetul numit Joomla_1.5.9-Stable-Full_Package.zip Odata descarcata pe calculator, se dezarhiveaza si mutam fiserele sub un folder crea
  9. Vreau sa va prezit un program f frumusel cu care poti face orice template vrei in csm-urile de sus mentionate joomla, wordpress, drupal si personale. Acest program se numeste Artisteer 2. Il puteti downloada e aici RapidShare: 1-CLICK Web hosting - Easy Filehosting E foarte usor de utilizat si poti face cu tot ce vrei in leg cu template, fara a avea nici o legatura cu vreun limbaj de programare, jucati-va cu el si il veti descoperii mai bine. Aveti aici un site in care am folosit acest program Welcome to the Frontpage Aveti aici o prezentare a acestui program eu sunt foarte multumit de el
×
×
  • Create New...